US9781093B2 - Authentication of a secure electronic device from a non-secure electronic device - Google Patents
Authentication of a secure electronic device from a non-secure electronic device Download PDFInfo
- Publication number
- US9781093B2 US9781093B2 US14/863,955 US201514863955A US9781093B2 US 9781093 B2 US9781093 B2 US 9781093B2 US 201514863955 A US201514863955 A US 201514863955A US 9781093 B2 US9781093 B2 US 9781093B2
- Authority
- US
- United States
- Prior art keywords
- secure electronic
- secure
- electronic device
- electronic circuit
- circuit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 230000002093 peripheral effect Effects 0.000 claims abstract description 102
- 238000000034 method Methods 0.000 claims abstract description 39
- 238000004590 computer program Methods 0.000 claims abstract description 8
- 230000009466 transformation Effects 0.000 claims description 53
- 230000005540 biological transmission Effects 0.000 claims description 12
- 238000000844 transformation Methods 0.000 description 15
- 239000003086 colorant Substances 0.000 description 13
- 230000006870 function Effects 0.000 description 5
- 101001013647 Mus musculus Methionine synthase Proteins 0.000 description 3
- 241000700605 Viruses Species 0.000 description 3
- 238000004040 coloring Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 241000826860 Trapezium Species 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000001627 detrimental effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 230000012447 hatching Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000011426 transformation method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/031—Protect user input by software means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/032—Protect output to user by software means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
Definitions
- the invention relates to the authentication of a secure electronic device (such as a bank server) from a non-secure electronic device (such as a personal computer or a cellphone).
- a secure electronic device such as a bank server
- a non-secure electronic device such as a personal computer or a cellphone
- Non-secure electronic devices are very widespread. Some of them derive their value from the fact that they are highly personalizable, that is to say it is possible to load therein all kinds of software for fulfilling the most diverse functions, which confers on them great flexibility.
- this requires opening up a large number of interfaces of the non-secure electronic device, to enable the largest possible number of third parties to develop the most varied possible software. By thus opening up the interfaces (that is to say the possible accesses), possibilities of abuse are also opened up.
- Making the interfaces secure often proves to be extremely constraining in the current state of knowledge, and therefore sometimes the wealth of functionalities is sometimes favored to the detriment of security. As a corollary, there exist numerous ways of violating the security of such non-secure electronic devices.
- malware designed to intercept the keystrokes made on a keyboard of the non-secure electronic device and to spy on them or even (in addition) to modify them.
- malware designed to take control of a screen of the non-secure electronic device and to display something other than what the electronic device is supposed to display.
- These various items of malware thus make it possible to intercept passwords and to modify transactions without the user of the non-secure electronic device being aware of it.
- a person making a bank transfer may thus think (on the basis of his keystrokes and the display) that he has made a transfer of a certain amount to a certain account, whereas the malware has in reality made a much higher transfer to another account (that of the attacker for example).
- Installing a secure electronic circuit within a non-secure electronic circuit is known. This aims in particular to protect various tasks performed by the non-secure electronic device.
- Reserving part of a screen of the non-secure electronic device for the secure electronic circuit is in particular known.
- the secure electronic circuit can display information in this part of the screen, and the user of the non-secure electronic device has thus the certainty that what is displayed in this screen part comes from the secure electronic circuit (rather than, for example, a virus directly controlling the screen).
- This solution does however require making this part of the screen unavailable for normal use, which is extremely detrimental in many situations.
- LED dedicated light emitting diode
- EP 1952297 A2 discloses a method for the authentication, by a user, of a secure operating mode of an information system comprising means for presenting information to the user, means for the entry of data by the user and storage means.
- U.S. Pat. No. 7,302,585B1, EP 1056014 A1 and EP 1181645 A1 for their part disclose a data processing system comprising a secure display processor distinct from the main processor of the system.
- the secure display processor interacts with a chip card in order to extract and display a secure image.
- the invention improves the situation.
- This method is advantageous in that it enables a human user of the non-secured electronic device to ensure that he has indeed established a secure connection with the secure electronic device.
- a secure electronic circuit arranged so as to be installed in a non-secured electronic device comprising an input peripheral and an output peripheral comprises:
- an electronic secure session opening circuit arranged to open a secure session with a secure electronic device
- an electronic transmission circuit arranged to transmit user information to the secure electronic device
- an electronic reception circuit arranged to receive transformed user information resulting from a predetermined transformation applied by the secure electronic device to the user information
- an electronic transmission circuit arranged to send transformed user information to the output peripheral controlled by the secure electronic circuit
- an electronic obtaining circuit arranged to obtain authentication information from the input peripheral controlled by the secure electronic circuit
- an electronic authentication circuit arranged to authenticate the secure electronic device according to the authentication information obtained.
- This circuit is advantageous in that it enables the aforementioned method to be implemented.
- Another aspect of the invention relates to a computer program comprising a series of instructions which, when they are executed by a processor, implement the method according to one aspect of the invention.
- Another aspect of the invention relates to a non-transitory computer readable storage medium storing a computer program according to one aspect of the invention.
- FIG. 1 illustrates a method according to one aspect of the invention
- FIG. 2 illustrates said method in a different way
- FIG. 3 illustrates an electronic system according to one aspect of the invention
- FIG. 4 illustrates a TPM of a system according to one aspect of the invention
- FIGS. 5 to 8 illustrate image transformation techniques that can be used in the context of the invention.
- FIG. 1 illustrates the consecutive steps of a method according to one aspect of the invention.
- FIG. 1 thus shows:
- FIG. 2 shows the same method, illustrating the exchanges of information between the various entities.
- the horizontal bracket denoted VPN, TLS illustrates the secure session between the secure electronic circuit TPM and the secure electronic device BNK_SRV.
- the output peripherals SCR, TS, SPK, PRN are shown between the secure electronic circuit TPM and the secure electronic device BNK_SRV for convenience of illustration but are in principle not involved in the secure session VPN, TLS, which directly connects the secure electronic circuit TPM and the secure electronic device BNK_SRV.
- FIG. 2 thus illustrates, with the time elapsing along the downwardly oriented vertical axis:
- an acquisition ACQ by the secure electronic circuit TPM, of user information (in this case an IMG), obtained from an input peripheral (in this case it may be a camera CAM), then
- a reception RCPT via the secure session, by the secure electronic circuit TPM, of transformed user information (transformed image TRN_IMG) issuing from a predetermined transformation applied by the secure electronic device BNK_SRV to the user information IMG, then
- a sending DSPL by the secure electronic circuit TPM to the output peripheral SCR, SPK, PRN, TS controlled by the secure electronic circuit TPM (in this case the screen SCR or the touch screen TS or the printer PRN), of the transformed user information TRN_IMG, then
- a release REL (not shown) of the input peripheral KBD, MS, TS, CAM, MIC and of the output peripheral SCR, SPK, PRN, TS by the secure electronic circuit TPM (that is to say the secure electronic circuit is ceasing to control said peripherals and is making them directly accessible to other entities).
- FIG. 3 is an electronic system according to one aspect of the invention.
- the system comprises a secure electronic device BNK_SRV (in this case a bank server).
- This secure electronic device BNK_SRV communicates with non-secured electronic devices such as a personal computer PC or an intelligent cellphone (smartphone) SP.
- non-secured electronic devices comprise input peripherals such as a keyboard KBD, a mouse MS, a photographic apparatus (or camera) CAM, a microphone MIC or a touch screen TS. They also comprise output peripherals such as a screen SCR, a speaker SPK, a printer PRN or a touch screen TS (which is both an input and an output peripheral).
- the secure electronic device BNK_SRV can thus receive information (such as an image IMG) from the non-secured electronic devices and itself transmit to them information (such as a transformed image TRN_IMG).
- information such as an image IMG
- TRN_IMG transformed image
- FIG. 4 depicts in more detail a secure electronic circuit TPM.
- This secure electronic circuit TPM may comprise in particular circuits CTRL_C, OSS_C, ACQ_C, SND_C, RCPT_C, DSPL_C, OBT_C, AUTH_C and REL_C.
- Each of these nine circuits may comprise the same processor of the secure electronic circuit TPM (common to all these circuits or alternatively to only some of them) or have its own processor.
- Each of these circuits may comprise a memory comprising a computer program able to make each of these circuits function (that is to say able to implement the various functions liable to have to be executed by each of these circuits).
- each of the nine circuits comprises its own memory chip.
- the nine circuits are implemented in the form of custom-made electronic circuits (without a processor or computer program—for example in hard-wired logic).
- FIG. 5 illustrates an image transformation consisting of modifying a source image (the top image, in this case the photograph of a furnished room) identifying, by image processing, all the edges.
- the transformed image is an image composed of the identified edges. These edges are colored.
- the vertical edges (which may for example be defined as edges wherein the angle with respect to the vertical is between ⁇ 10° and +10°) are colored with a certain color (for example green), the horizontal edges (which may for example be defined as edges wherein the angle with respect to the vertical is between ⁇ 20° and +20°) are colored with another color (for example orange), and the other edges are colored randomly.
- the user chooses the color of the vertical and horizontal edges and expects that the transformed image received corresponds to the image that he has transmitted, modified by coloring the edges in the way that he has specified.
- the colors in the photograph are represented in gray shades and the colors of the edges are represented schematically by various types of line (solid, broken).
- FIG. 6 illustrates another image transformation consisting of modifying a source image (the top image, in this case the photograph of two sun loungers and a parasol on a beach) by adding three stars at the center of the image.
- the user therefore defines the transformation by requesting the addition of three stars at the center of the image, in the form of a watermark.
- the size of the stars is chosen randomly and the stars are chosen substantially at the center of the image (random positioning but close to the center).
- the secure electronic device is arranged to add many other elements (including other stars) in a completely random fashion. The user must check that, among all the elements added, there are indeed three stars towards the center.
- the colors in the photograph are represented in gray shades and the colors of the edges of the added elements are represented schematically by various types of line (solid, broken).
- FIG. 7 illustrates another image transformation consisting of modifying a source image (the top image, in this case the photograph of two sun loungers and a parasol on a beach) by overlaying three disks on the image.
- the user has therefore previously defined the transformation by requiring the overlaying of three disks on the image.
- the size of the disks is chosen randomly.
- the secure electronic device is arranged to add numerous other elements (but not other disks), completely randomly. The user must check that, among all the elements added, there are indeed three disks.
- the colors of the photograph are depicted in gray shades and the colors of the surface of the added elements are depicted schematically by various types of hatching (dots, segments, grids).
- FIG. 8 illustrates another image transformation consisting of modifying a source image (the top image, in this case a photograph of a train in a Paris subway station) by thresholding the image (thresholding of the color histogram) and then replacing the dominant color with a color predefined by the user.
- the user can thus check that the dominant color in the image is indeed replaced by the color that he has defined.
- the other colors may be defined randomly.
- the colors in the photograph are depicted in gray shades and the thresholded colors of the bottom photograph are also represented by gray shades. In reality, the thresholded colors are more easily identifiable than gray shades (for example: orange, yellow, green, blue, red, white, gray).
- a first embodiment relates to a method for authenticating a secure electronic device BNK_SRV.
- the secure electronic device BNK_SRV is for example a server for making bank transactions, or any other server, or even a secure customer device (such as a personal computer or a cellphone protected by a secure electronic circuit according to one embodiment of the invention).
- the authentication is effected from a non-secured electronic device (such as a personal computer PC, or a smartphone SP) able to communicate (for example in client server mode, or in centralized or decentralized peer to peer mode) with the secure electronic device.
- the non-secured electronic device comprises an input peripheral (such as a keyboard KBD, a mouse MS, a touchscreen TS, a microphone MIC and/or a camera CAM). It also comprises an output peripheral (such as a screen SCR, optionally a touchscreen TS, a speaker SPK and/or a printer PRN).
- a secure electronic circuit TPM This secure electronic circuit TPM makes it possible to establish a trusted execution environment designated by the acronym TEE).
- this secure electronic circuit is an autonomous circuit.
- this secure electronic circuit is a secure subassembly or a non-secured electronic circuit, for example a secure subassembly with partitioning of execution of a processor (for example via the TrustZone® technology from the company ARM, available in particular on the products ARM Cortex-A57, ARM Cortex-A53, ARM Cortex-A15, ARM Cortex-A12, ARM Cortex-A9, ARM Cortex-A8, ARM Cortex-A7, ARM Cortex-A5 or ARM1176).
- the method comprises a taking of control CTRL of the input peripheral (or of a plurality or all of them) and of the output peripheral (or of a plurality or all of them) by the secure electronic circuit TPM.
- This taking of control comprises for example a prohibition of access by the peripherals concerned to the main processor of the non-secured electronic device, access being reserved for the secure electronic circuit TPM.
- the various peripherals may be connected by buses to the secure electronic circuit TPM (and not to the main processor directly), and the TPM may be connected to the main processor, and enable or not communication from/to the peripherals.
- the peripherals may be connected via buses to the main processor but the buses then comprise deconnection means activatable by the secure electronic circuit and preventing the main processor (and therefore any malware executed by the main processor) from accessing the peripherals.
- This taking of control also comprises the option for the secure electronic circuit TPM to send and receive information from the peripherals concerned (for example via the aforementioned buses).
- the method comprises an opening of a secure session OSS (for example a virtual private network session VPN, or a secure http session TLS) by the secure electronic circuit TPM with the secure electronic device BNK_SRV. It is for example an end-to-end secure session (no intermediate equipment between the secure electronic circuit and the secure electronic device then being able to access the content of the session).
- a secure session is protected by electronic signature of the exchange data and/or by enciphering of these data.
- the enciphering and/or signature parameters as well as, where applicable, other session opening parameters, are defined during an enrollment phase described below.
- the secure electronic circuit TPM takes for example control of a network card (understood in the broad sense, and covering in particular Ethernet, WiFi, 3G, 4G, Bluetooth or other cards) of the non-secured electronic devices and establishes the secure session via this network card with the secure electronic device concerned.
- the secure electronic device is arranged to accept opening a secure session only with a suitably authenticated secure electronic circuit.
- the method comprises for this purpose a mutual authentication of the secure electronic circuit and of the secure electronic device.
- the secure electronic device requires not only for the secure electronic circuit to be authenticated but for it to belong to a predefined and accepted category.
- the opening of the secure session is subject to an authentication (for example of the PKI type) of the secure electronic circuit, and the secure electronic circuit checks that the certificate of the secure electronic circuit, in addition to being valid, is sent by a certification authority recognized for this purpose (rather than by just any certification authority), and/or that the certificate comprises certain particular attributes (such as an attribute specifying that the certificate is approved for use in the context of a secure session opening according to the first embodiment of the invention).
- an authentication for example of the PKI type
- the secure electronic circuit checks that the certificate of the secure electronic circuit, in addition to being valid, is sent by a certification authority recognized for this purpose (rather than by just any certification authority), and/or that the certificate comprises certain particular attributes (such as an attribute specifying that the certificate is approved for use in the context of a secure session opening according to the first embodiment of the invention).
- the method comprises an acquisition ACQ by the secure electronic circuit TPM, of user information (for example an image IMG, a sound, a series of vibrations, etc.).
- the user information is information selected by a (human) user of the non-secured electronic device among available information (for example among files stored on the non-secured electronic device), or is information generated by the user.
- the user receives an instruction to choose arbitrary user information (preferably different on each occasion so as to avoid playback, that is to say for single usage).
- the user receives the instruction (combinable with the instruction of the previous phrase) to choose user information which, in addition to being retrievable by an output peripheral of the non-secured electronic device, is easily understood by this user.
- the user information is arbitrary and/or for single use and/or easily understandable by a human user.
- the acquisition ACQ takes place via a peripheral controlled by the secure electronic circuit, or at least within the range of a trusted execution environment TEE (supervised by said circuit).
- the method comprises a transmission SND, by the secure electronic circuit TPM to the secure electronic device BNK_SRV, of the user information.
- this transmission takes place via the previously established secure session, so that third parties cannot intercept the user information when it is transferred from the secure electronic device to the secure electronic circuit. This is then double security since, as will be disclosed below, even if the user information were to fall into the hands of an attacker, it would not (at least according to some implementations) be usable.
- the method comprises a reception RCPT, by the secure electronic circuit TPM, of transformed user information TRN_IMG issuing from a predetermined transformation applied by the secure electronic device BNK_SRV to the user information IMG.
- this predetermined transformation forms part of a set of predetermined transformations and is selected by the user during a prior enrollment phase. For example, the user goes to his bank branch and makes the aforementioned selection via a secure terminal available in the branch, said terminal transmitting the selection in a secure fashion to the secure electronic device BNK_SRV.
- the secure electronic circuit TPM stores the list of possible predetermined transformations in advance.
- the user then locally (initially, then on each occasion that he wishes to modify his choice of transformations) makes the aforementioned selection, from his non-secured electronic device, under the control of the secure electronic circuit TPM (which transmits said selection to the secure electronic device BNK_SRV).
- the user is thus not obliged to go to a bank branch.
- the user selects, during a prior enrollment phase, several predetermined transformations.
- the selected transformation or transformations is or are such that it or they is or are difficult to determine solely on the basis of given user information and the result of this or these transformation or transformations applied to this user information.
- the transformation or transformations is or are such that is or they is or are difficult to determine solely on the basis of a set of user information and the results of this or these transformation or transformations applied to the user information in this set.
- the secure electronic device BNK_SRV randomly chooses a predetermined transformation among those selected by the user during the enrollment phase (when several have been selected during the enrollment). Having available several possible predetermined transformations makes an attack by an ill-intentioned third party more difficult even when such third party succeeded in accessing both several items of user information and the corresponding transformed user information. This is because the third party would have more difficulty in determining a transformation when the intercepted data statistically result from several (unidentified) transformations. This does however require the human user to await several possible transformations and to recognize any one of the transformations that he has selected during the enrollment as being a valid transformation.
- the method comprises a sending DSPL, by the secure electronic circuit TPM to the output peripheral controlled by the secure electronic circuit TPM, of the transformed user information TRN_IMG.
- the sending takes place to several peripherals.
- the transformed user information may comprise (or consist of) a video displayed on a screen accompanied by a corresponding sound simultaneously broadcast on a speaker.
- the method comprises an obtaining OBT of authentication information OK_NOK (which may indicate an authentication, OK, or a lack of authentication, NOK) by the secure electronic circuit TPM from the input peripheral controlled by the secure electronic circuit TPM.
- OK_NOK which may indicate an authentication, OK, or a lack of authentication, NOK
- a human user recognizing that the transformed user information that has been communicated to him does indeed correspond to the user information that he sent to the non-secured electronic device during the acquisition phase, concludes that he is indeed communicating with the secure electronic device and consequently can use an input peripheral for introducing information indicating that he recognizes the transformed user information (or in the contrary case information indicating that he does not recognize the transformed user information).
- the method then comprises an authentication AUTH, by the secure electronic circuit TPM, of the secure electronic device BNK_SRV according to the authentication information OK_NOK obtained.
- a transaction for example a bank transfer or any sensitive operation made possible via the secure electronic device BNK_SRV
- the transaction comprises a display (via an output peripheral controlled by the secure electronic circuit), followed by a validation (via an input peripheral controlled by the secure electronic circuit) and optionally preceded by an entry (via an input peripheral controlled by the secure electronic circuit), of information representing the transaction (such as a transaction amount, an identification of the participants in the transaction, etc.).
- the validation comprises an entry of personal or confidential information (PIN code, etc.) via an input peripheral controlled by the secure electronic circuit.
- the step SND occurs after the step ACQ.
- the step RCPT occurs after the step SND.
- the step DSPL occurs after the step RCPT and after the step CTRL.
- the step OBT occurs after the step DSPL.
- the step AUTH occurs after the step OBT.
- the user information of an authentication method according to the first embodiment is a photograph IMG.
- an authentication method comprises a taking of the photograph IMG by an input peripheral CAM of the non-secured electronic device SP.
- a user can thus use a camera CAM integrated in his smartphone SP in order to take any photograph (in his environment) and check whether the treatment carried out on this photograph by a transformation that he has allegedly selected is indeed the one (or one of those) that he is expecting.
- the camera is controlled by the security electronic circuit (that is to say for example it is disconnected from the main processor by said circuit) so that there is no doubt about the fact that it is indeed the photograph taken by the user that is transmitted to said circuit. This is a double security since, even if an attacker were to make a substitution, the result would be that the transformed user information would not correspond to the user information that the user thinks he has sent.
- an authentication method comprises a release REL of an input peripheral (for example a keyboard KBD, a mouse MS, a touchscreen TS and/or a camera CAM) and of the output peripheral (for example a screen SCR, a speaker SPK or a printer PRN) by the secure electronic circuit TPM.
- the release comprises the cessation of the control resulting from the taking of control.
- the release of the output peripheral is preceded by a sending DSPL_LV, by the secure electronic circuit TPM, of release information SEC_MSG to said output peripheral.
- the secure electronic circuit TPM would in any event notify the exit from this mode (for example by means of a message displayed on a screen).
- the secure electronic circuit releases the peripherals only after a predefined time (for example 1 second). This ensures that the release message will be broadcast during at least the time in question (and will therefore be visible to the user).
- the user must enable exit from the controlled mode in a secure fashion, for example via an input peripheral KBD controlled CTRL by the secure electronic circuit TPM (so that an exit from controlled mode is not possible or at least more difficult without the agreement of the user).
- the step REL occurs after the step AUTH.
- a secure electronic circuit TPM is arranged so as to be installed in a non-secured electronic device (for example a personal computer PC or a smartphone SP) comprising an input peripheral (for example KBD, MS, TS and/or CAM) and an output peripheral (for example SCR, SPK and/or PRN).
- a non-secured electronic device for example a personal computer PC or a smartphone SP
- an input peripheral for example KBD, MS, TS and/or CAM
- an output peripheral for example SCR, SPK and/or PRN
- the secure electronic circuit TPM comprises an electronic control circuit CTRL_C for the input peripheral and the output peripheral.
- the secure electronic circuit TPM comprises an electronic secure session opening circuit OSS_C arranged to open a secure session with a secure electronic device BNK_SRV.
- the secure electronic circuit TPM comprises an electronic user information acquiring circuit ACQ_C arranged to acquire user information IMG.
- the secure electronic circuit TPM comprises an electronic transmission circuit SND_C arranged to send user information IMG to the secure electronic device BNK_SRV.
- the secure electronic circuit TPM comprises an electronic reception circuit RCPT_C arranged to receive transformed user information TRN_IMG issuing from a predetermined transformation applied by the secure electronic device BNK_SRV to the user information IMG.
- the secure electronic circuit TPM comprises an electronic transmission circuit DSPL_C arranged to send transformed user information TRN_IMG to the output peripheral controlled by the secure electronic circuit TPM.
- the secure electronic circuit TPM comprises an electronic obtaining circuit OBT_C arranged to obtain authentication information OK_NOK from the input peripheral controlled by the secure electronic circuit TPM.
- the secure electronic circuit TPM comprises an electronic authentication circuit AUTH_C arranged to authenticate the secure electronic device BNK_SRV according to the authentication information OK_NOK obtained.
- the electronic control circuit CTRL_C, the electronic secure session opening circuit OSS_C the electronic acquisition circuit ACQ-C, the electronic transmission circuit SND_C, the electronic reception circuit RCPT_C, the electronic transmission circuit DSPL_C, the electronic obtaining circuit OBT_C and the electronic authentication circuit AUTH_C are eight dedicated and distinct electronic circuits, designed for example on the basis of ASICs or FPGAs.
- these eight circuits each comprise at least one processor and a memory storing a program arranged to implement the aforementioned respective function (associated with the respective circuit among the eight circuits) when it is executed by said processor.
- all or some of these eight circuits share a common processor.
- these eight circuits each comprise a memory storing a program
- these eight circuits also each comprise a processor (optionally common to all or some of the eight circuits) constituting a distinct discrete (and separate) component of the respective memory, optionally common to all or some of the eight different circuits.
- the memory optionally common to all or some of these eight circuits, is at least partly a standard memory of the non-secured electronic device (such as a personal computer or smartphone memory), enciphered by a cryptographic key stored in a part of the secure electronic circuit particular to said secure electronic circuit (that is to say not shared with components of the non-secured electronic device).
- a secure electronic circuit may use (and even comprise, within the meaning of the present embodiment) a part of the memory of the non-secured electronic device in which it is intended to be installed (in order to extend its own memory), provided that this memory part is enciphered in such a way as to be inaccessible to the non-secured electronic device and in particular to its main processor.
- This memory part (and the enciphered information that is stored therein) is then common to the secure electronic circuit and to the non-secured electronic device.
- the user information IMG of a secure electronic circuit TPM according to the fifth embodiment is a photograph.
- a non-secured electronic device SP comprises a secure electronic circuit TPM according to the sixth embodiment and an input peripheral CAM arranged to take the photograph IMG.
- Another embodiment relates to a system comprising a non-secured electronic device comprising a secure electronic circuit according to one embodiment of the invention, and a secure electronic device according to one embodiment of the invention.
- a secure electronic circuit TPM according to the fifth or sixth embodiment comprises an electronic release circuit REL_C arranged to release the input peripheral and output peripheral, and arranged to send release information SEC_MSG to said output peripheral before releasing it.
- the electronic release circuit REL_C is a dedicated electronic circuit distinct from the aforementioned eight electronic circuits, designed for example on the basis of one or more ASICs and/or FPGAs.
- this ninth circuit comprises at least one processor and a memory storing a program arranged to implement the aforementioned respective function (associated with this ninth circuit) when it is executed by said processor.
- this ninth electronic circuit shares a common processor with all or some of these eight circuits.
- these nine circuits each comprise a memory storing a program
- these nine circuits also each comprise a processor (optionally common to all or some of the nine circuits) constituting a discrete (and separate) component distinct from the respective memory, optionally common to all or some of the nine different circuits.
- the memory optionally common to all or some of these nine circuits, is at least partly a standard memory of the non-secured electronic device (such as a personal computer or smartphone memory), enciphered by a cryptographic key stored in a part of the secure electronic circuit particular to said secure electronic circuit (that is to say not shared with components of the non-secured electronic device).
- a computer program comprises a series of instructions which, when they are executed by a processor or a plurality of processors, implement the method according to one of the first to fourth embodiments.
- This computer program may be written in particular in assembler, in C language, or in any other suitable programming language.
- a non-transitory computer readable storage medium stores a computer program according to the ninth embodiment.
- This storage medium is for example a non-volatile memory of the EEPROM, ROM, Flash or battery-protected RAM type or a magnetic or optical medium. It may in particular be a proprietary or standard card (for example of the microSD type).
- this program is stored in enciphered form that can be deciphered by the secure electronic circuit but not by the non-secured electronic devices (and in particular not by its main processor).
- One possible transformation consists of applying a contour detection (for identifying edges in image) followed by coloring of the edges lying in a certain range of angles with a color provided by the user at the time of enrollment.
- the other edges may be colored with randomly chosen colors.
- One possible transformation consists of applying a watermark at a position chosen by the user at the time of enrollment.
- the screen is partitioned into zones and a code or keyword is associated with each zone, indicating the spatial location (for example north, south, east, west and center) for identifying the zone.
- the user chooses the zone where the watermark is to be inserted by selecting the corresponding keyword.
- random watermarks are placed on zones other than the one targeted.
- One possible transformation consists of overlaying n (n is entered at the time of enrollment) times a chosen object on the image from a predefined list of objects. For example, geometric shapes (triangle, circle, square, trapezium). In order to reduce the risks of reproduction of this transformation by a third party physically spying on the user in the process of using his mobile equipment, other geometric shapes are overlaid in random numbers.
- One possible transformation consists of a thresholding of the histogram of the colors. A previously defined color is then replaced by a color entered for example at the time of enrollment. In order to reduce the risks of reproduction of this transformation by a third party physically spying on the user in the process of using his mobile equipment, the other colors are also modified.
- One possible transformation consists of a definition of a signature and encryption system.
- conventional signature and encryption methods are established.
- a system relying on a public-key infrastructure is used.
- the service provides the user with his public-key and valid certificate.
- As for the user he generates his key pair and has it certified by the service.
- techniques of signature by watermark and image encryption using bijective image transformations of the Boulanger, Peano, Hilbert or other type are possible. The latter technique requires only the exchange of a sequence of transformations and number of cycles to be effected.
- the service may establish a system of the anti-latency type, in particular by means of the signature of the image transmitted by the user to the service.
- a method operating with a secure electronic device such as a server allowing bank transactions (to which a non-secured electronic device such a smartphone can be connected via for example a network such as the internet) was described above.
- the invention applies to any type of relevant server, and even to other electronic devices (such as devices capable of operating in P2P with the non-secured electronic device).
- the non-secured electronic device has been presented as being able to be a personal computer or a smartphone, but it may obviously be an electronic device of a different type (for example a connected tablet, a connected MP3 reader, a connected PDA, a connected e-reader, etc.).
- other types of user information other than those listed above may be used, in particular sound, with speech, or movements by virtue of an embodied gyroscope, or lines on the touch screen, or mimics made in front of the built-in camera can be used.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (5)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1459069A FR3026524B1 (en) | 2014-09-25 | 2014-09-25 | AUTHENTICATION OF A SECURE ELECTRONIC DEVICE FROM AN UNSECURED ELECTRONIC DEVICE |
FR1459069 | 2014-09-25 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20160094533A1 US20160094533A1 (en) | 2016-03-31 |
US9781093B2 true US9781093B2 (en) | 2017-10-03 |
Family
ID=52345271
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/863,955 Active 2035-11-27 US9781093B2 (en) | 2014-09-25 | 2015-09-24 | Authentication of a secure electronic device from a non-secure electronic device |
Country Status (3)
Country | Link |
---|---|
US (1) | US9781093B2 (en) |
EP (1) | EP3001638B1 (en) |
FR (1) | FR3026524B1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3007168B1 (en) | 2013-06-18 | 2016-10-07 | Stmicroelectronics Rousset | MECHANISM FOR VERIFYING THE AUTHENTICITY OF A PRODUCT |
FR3007169B1 (en) | 2013-06-18 | 2016-10-07 | Stmicroelectronics Rousset | METHOD OF VERIFYING THE AUTHENTICITY OF A PRODUCT |
US11374909B2 (en) * | 2019-11-22 | 2022-06-28 | Flex Ltd. | Use of trusted platform modules for cryptographic operations in an internet of things device |
CN113012019B (en) * | 2021-04-23 | 2023-12-26 | 中国科学院空间应用工程与技术中心 | Image watermarking method, system and electronic equipment |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060090073A1 (en) | 2004-04-27 | 2006-04-27 | Shira Steinberg | System and method of using human friendly representations of mathematical values and activity analysis to confirm authenticity |
WO2007060322A2 (en) | 2005-11-22 | 2007-05-31 | Trusted Logic | Method and device for authentication by a user of a trustworthy interface and related computer programme |
US7302585B1 (en) | 1999-05-28 | 2007-11-27 | Hewlett-Packard Development Company, L.P. | System for providing a trustworthy user interface |
US20080235779A1 (en) * | 2007-03-22 | 2008-09-25 | Neocleus Ltd. | Trusted local single sign-on |
US20130275306A1 (en) * | 2012-04-13 | 2013-10-17 | Sergey Ignatchenko | Apparatuses, methods and systems for computer-based secure transactions |
US20130305392A1 (en) * | 2012-05-08 | 2013-11-14 | Hagai Bar-El | System, device, and method of secure entry and handling of passwords |
US20140007221A1 (en) | 2012-06-29 | 2014-01-02 | Jasmeet Chhabra | Secure image authentication |
US20140282543A1 (en) * | 2013-03-15 | 2014-09-18 | Ologn Technologies Ag | Secure zone on a virutal machine for digital communications |
US20140282959A1 (en) * | 2013-03-15 | 2014-09-18 | Mobilesphere Holdings LLC | System and method for computer authentication with user modification of an image using a shared secret |
US20150038118A1 (en) * | 2012-02-27 | 2015-02-05 | Morpho | Method for verifying the identity of a user of a communicating terminal and associated system |
US20150063625A1 (en) * | 2013-08-28 | 2015-03-05 | Morpho Trust USA Inc. | Dynamic digital watermark |
US20150106897A1 (en) * | 2013-10-16 | 2015-04-16 | Evan Davis | Method and system for implementing video two factor authentication |
-
2014
- 2014-09-25 FR FR1459069A patent/FR3026524B1/en not_active Expired - Fee Related
-
2015
- 2015-09-22 EP EP15186351.1A patent/EP3001638B1/en active Active
- 2015-09-24 US US14/863,955 patent/US9781093B2/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7302585B1 (en) | 1999-05-28 | 2007-11-27 | Hewlett-Packard Development Company, L.P. | System for providing a trustworthy user interface |
US20060090073A1 (en) | 2004-04-27 | 2006-04-27 | Shira Steinberg | System and method of using human friendly representations of mathematical values and activity analysis to confirm authenticity |
WO2007060322A2 (en) | 2005-11-22 | 2007-05-31 | Trusted Logic | Method and device for authentication by a user of a trustworthy interface and related computer programme |
US20080235779A1 (en) * | 2007-03-22 | 2008-09-25 | Neocleus Ltd. | Trusted local single sign-on |
US20150038118A1 (en) * | 2012-02-27 | 2015-02-05 | Morpho | Method for verifying the identity of a user of a communicating terminal and associated system |
US20130275306A1 (en) * | 2012-04-13 | 2013-10-17 | Sergey Ignatchenko | Apparatuses, methods and systems for computer-based secure transactions |
US20130305392A1 (en) * | 2012-05-08 | 2013-11-14 | Hagai Bar-El | System, device, and method of secure entry and handling of passwords |
US20140007221A1 (en) | 2012-06-29 | 2014-01-02 | Jasmeet Chhabra | Secure image authentication |
US20140282543A1 (en) * | 2013-03-15 | 2014-09-18 | Ologn Technologies Ag | Secure zone on a virutal machine for digital communications |
US20140282959A1 (en) * | 2013-03-15 | 2014-09-18 | Mobilesphere Holdings LLC | System and method for computer authentication with user modification of an image using a shared secret |
US20150063625A1 (en) * | 2013-08-28 | 2015-03-05 | Morpho Trust USA Inc. | Dynamic digital watermark |
US20150106897A1 (en) * | 2013-10-16 | 2015-04-16 | Evan Davis | Method and system for implementing video two factor authentication |
Also Published As
Publication number | Publication date |
---|---|
FR3026524B1 (en) | 2016-10-28 |
US20160094533A1 (en) | 2016-03-31 |
EP3001638B1 (en) | 2017-04-26 |
FR3026524A1 (en) | 2016-04-01 |
EP3001638A1 (en) | 2016-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7308180B2 (en) | Advanced authentication technology and its application | |
US20200404019A1 (en) | Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements | |
US9659160B2 (en) | System and methods for authentication using multiple devices | |
US10237070B2 (en) | System and method for sharing keys across authenticators | |
US10091195B2 (en) | System and method for bootstrapping a user binding | |
US12126613B2 (en) | System and method for pre-registration of FIDO authenticators | |
US9380058B1 (en) | Systems and methods for anonymous authentication using multiple devices | |
US9660995B2 (en) | Methods, systems, and computer readable media for combating device theft with user notarization | |
US10097666B2 (en) | Accessing a service using an encrypted token | |
JP2008199620A (en) | Method, mobile terminal, processing apparatus and program for executing verification process | |
US9781093B2 (en) | Authentication of a secure electronic device from a non-secure electronic device | |
US9332011B2 (en) | Secure authentication system with automatic cancellation of fraudulent operations | |
JP6835851B2 (en) | Multi-user strict authentication token | |
US20180167674A1 (en) | System and method for trusted presentation of information on untrusted user devices | |
CN109831311A (en) | A kind of server validation method, system, user terminal and readable storage medium storing program for executing | |
WO2018027148A1 (en) | Authentication techniques including speech and/or lip movement analysis | |
US10735409B2 (en) | Authenication stick | |
KR20190050159A (en) | Method and apparatus for providing security status of communication block | |
KR101404537B1 (en) | A server access control system by automatically changing user passwords and the method thereof | |
JP2023500980A (en) | Device and method for secure communication | |
CN111062025A (en) | Application data processing method and related device | |
WO2024160717A1 (en) | Secure on-boarding of personal attributes on an external entity | |
CN119337345A (en) | A data processing method and related equipment | |
Messerges et al. | Securing Derived Credentials on a Mobile Device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MORPHO, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BUCCI, DAMIEN MICHAEL FLORENT;SOBCZYK, DOMINIQUE;REEL/FRAME:036847/0962 Effective date: 20151015 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: IDEMIA IDENTITY & SECURITY FRANCE, FRANCE Free format text: CHANGE OF NAME;ASSIGNOR:MORPHO;REEL/FRAME:062895/0357 Effective date: 20171002 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |